Develop the basic procedures for the ken 7 windows

Assignment Help Management Information Sys
Reference no: EM131996075

Assignment Requirements

In this assignment, you will develop the basic procedures for the Ken 7 Windows Limited security personnel to change any access controls.

The purpose of these procedures is not to do busy work, but to ensure that:

You understand and document the purpose of each access control change request.

You know what access controls were in place before any changes.

You get an approval of change by the Ken 7 Windows personnel.

You understand the scope of the change, both with respect to users, computers, and objects.

You have evaluated the expected impact of the change.

You know how to evaluate whether the change meets the goals.

You understand how to undo any change if necessary.

The procedure guide must contain the steps any Ken 7 Windows Limited personnel should take to evaluate and implement an access control change.

Ensure that your procedures and the documentation the procedures created for each change include the following:

Status or setting prior to any change

Reason for the change

Change to implement

Scope of the change

Impact of the change

Status or setting after the change

Process to evaluate the change

You should create a form that security personnel should use and the step-by-step procedures they should follow to explain and implement an access control change.

Your procedure document should explain the need for following these procedures and the benefits to Ken 7 Windows Limited.

You should also instruct personnel what to do with the forms after completing them and how they will be stored. All you need to include is a short discussion on how to retrieve forms if you need to undo a change.

Submission Requirements

· Format: Microsoft Word

· Font: Times New Roman, 12-Point, Double-Space

· Citation Style: APA Style with 3 references

· Length: 1-2 pages

Reference no: EM131996075

Questions Cloud

Same number of electrons : Explain why these ions have different sizes even though they contain the same number of electrons.
Marker change chemical composition : How does water running over a limestone grave marker change its chemical composition?
Plans on saving money to buy some new equipment : The James Co. plans on saving money to buy some new equipment. how much money will the James Co. have in their account five years from now?
Mixture of methanol and water : A water flow of 40.0 L / s flows in a pipe. At a given point, a mixture of methanol and water is injected with a 40.0% mass fraction of methanol.
Develop the basic procedures for the ken 7 windows : The procedure guide must contain the steps any Ken 7 Windows Limited personnel should take to evaluate and implement an access control change.
Should firms invest in money market securities : Should firms invest in money market securities? Does governance of firms affect the prices of their bonds?
Write an extended metaphor poem : Write an extended metaphor poem. You may write as many stanzas as you would like; however, your poem should be no less than 10 lines.
The current state of the art emerging knowledge domains : MN502 Overview of Network Security : Firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains.
How will you gather the data from your sample : How will you gather the data from your sample (method)? Finally, what do you predict that you will find from this research?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare and contrast the mobile security devices

Assess the role of HTTPS in cryptography in terms of its success, failures, performance issues, and cost effectiveness. Provide a rationale for your response.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  Describe what functions should it perform for the company

In what ways can the business benefit from a Web site? What functions should it perform for the company (e.g., marketing, sales, customer support, internal communications, etc.)?

  Evaluate the two major information delivery methods

Evaluate the two major information delivery methods in mobile commerce - data security of information transmitted in the wireless network

  Discuss the conditions that lead to the freedom with fences

Can the "fences" stall the very idea the executive seeks to achieve? And if we cannot train to these ideals, but only hire to them.

  Contrast to challenge the assumptions of the age of reason

After reading Candide by voltaire, write a paper comparing the optimistic philosophy of Pangloss with the pessimism of Martin.

  Explain what types of data were collected for the research

Explain what types of data were collected for the research? How was collected data analyzed? Why do you want to include collected data in your research project.

  Describe the methods to mitigate the vulnerabilities

Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. Describe the methods to mitigate the vulnerabilities, as they relate to the seven domains.

  Hierarchical tree

Write a two-and-a-half-page report briefly describing SNMP and its commands and describing MIB-1/MIB-2, including the hierarchical tree, object identifier (OID), groups, and object types

  What is the purpose of creating a logical process model

What is the purpose of creating a logical process model and then a physical process model?

  Accounting information systems explained in this solution1

accounting information systems explained in this solution1. how can ais reports be used to provide strategic

  Discuss the top-three physical security controls

Imagine you are in charge of designing physical security controls for your employer, which operates out of a multitenant office building. Discuss the top-three physical security controls that you believe need to be implemented in order to secure t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd